CN114095920A - Communication method, system, apparatus, device and storage medium - Google Patents
Communication method, system, apparatus, device and storage medium Download PDFInfo
- Publication number
- CN114095920A CN114095920A CN202010745624.1A CN202010745624A CN114095920A CN 114095920 A CN114095920 A CN 114095920A CN 202010745624 A CN202010745624 A CN 202010745624A CN 114095920 A CN114095920 A CN 114095920A
- Authority
- CN
- China
- Prior art keywords
- data
- processed
- key
- time
- frequency band
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 178
- 238000000034 method Methods 0.000 title claims abstract description 69
- 230000005540 biological transmission Effects 0.000 claims abstract description 50
- 238000001514 detection method Methods 0.000 claims description 18
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 11
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 239000000523 sample Substances 0.000 claims description 2
- 238000005336 cracking Methods 0.000 abstract description 5
- 238000010248 power generation Methods 0.000 description 30
- 230000008569 process Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 11
- YSMRWXYRXBRSND-UHFFFAOYSA-N TOTP Chemical compound CC1=CC=CC=C1OP(=O)(OC=1C(=CC=CC=1)C)OC1=CC=CC=C1C YSMRWXYRXBRSND-UHFFFAOYSA-N 0.000 description 10
- 230000004044 response Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 239000003245 coal Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a communication method, a system, a device, equipment and a storage medium, wherein the method comprises the following steps: the first device firstly obtains data to be processed and the sending time of the data to be processed, and then determines the secret key and the communication frequency band of the data to be processed according to the sending time. The first device encrypts the data to be processed by using the secret key, and sends the encrypted data to the second device through the obtained communication frequency band. As can be seen from the above description, the key and the communication band of the data to be processed are continuously changed with the transmission time of the data to be processed, that is, the key and the communication band are dynamic. The dynamic secret key increases the cracking difficulty of the data to be processed; the dynamic communication frequency band increases the difficulty of frequency band attack, and the data to be processed is more difficult to capture. Therefore, the invention can ensure the safety of data transmission from different aspects.
Description
Technical Field
The present invention relates to the field of wireless transmission, and in particular, to a communication method, system, apparatus, device, and storage medium.
Background
The communication between devices using wireless transmission technology has been applied to many fields. For example, in an industrial scenario, image data may be transmitted by using a wireless transmission technology, so as to control and monitor industrial equipment such as an electric power facility and a coal energy facility according to the image data. For another example, in a consumption scene, communication between two transaction parties can be realized through a wireless transmission technology, so that consumption is completed.
It is easily understood that, in addition to the above-described scenarios, the security of data transmission is guaranteed in other scenarios. For a scene with higher transmission safety requirements, it is more important to ensure the safe transmission of data. Therefore, how to improve the security of data transmission becomes an urgent problem to be solved.
Disclosure of Invention
Embodiments of the present invention provide a communication method, system, apparatus, device and storage medium to ensure security of data transmission.
In a first aspect, an embodiment of the present invention provides a communication method, including:
acquiring data to be processed and sending time of the data to be processed;
determining a key and a communication frequency band corresponding to the data to be processed according to the sending time;
and sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band.
In a second aspect, an embodiment of the present invention provides a communication apparatus, including:
the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring data to be processed and the sending time of the data to be processed;
a determining module, configured to determine, according to the sending time, a key and a communication frequency band corresponding to the to-be-processed data;
and the sending module is used for sending the data to be processed encrypted according to the secret key to the second equipment according to the communication frequency band.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor and a memory, where the memory is used to store one or more computer instructions, and when executed by the processor, the one or more computer instructions implement the communication method in the first aspect. The electronic device may also include a communication interface for communicating with other devices or a communication network.
In a fourth aspect, an embodiment of the present invention provides a non-transitory machine-readable storage medium having stored thereon executable code, which when executed by a processor of an electronic device, causes the processor to implement at least the communication method according to the first aspect.
In a fifth aspect, an embodiment of the present invention provides a communication method, including:
acquiring data to be processed and sending time of the data to be processed;
determining a key and a communication frequency band corresponding to the data to be processed according to the sending time;
and sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band in a LoRa wireless transmission mode.
In a sixth aspect, an embodiment of the present invention provides a communication apparatus, including:
the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring data to be processed and the sending time of the data to be processed;
a determining module, configured to determine, according to the sending time, a key and a communication frequency band corresponding to the to-be-processed data;
and the sending module is used for sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band in a LoRa wireless transmission mode.
In a seventh aspect, an embodiment of the present invention provides an electronic device, including a processor and a memory, where the memory is used to store one or more computer instructions, and when the one or more computer instructions are executed by the processor, the electronic device implements the communication method in the fifth aspect. The electronic device may also include a communication interface for communicating with other devices or a communication network.
In an eighth aspect, the present invention provides a non-transitory machine-readable storage medium, on which executable code is stored, and when the executable code is executed by a processor of an electronic device, the processor is enabled to implement at least the communication method according to the fifth aspect.
In a ninth aspect, an embodiment of the present invention provides a communication system, including: a first device and a second device;
the first device is used for acquiring data to be processed and the sending time of the data to be processed; determining an encryption key and a communication frequency band corresponding to the data to be processed according to the sending time; according to the communication frequency band, sending the data to be processed encrypted according to the encryption key to the second device;
the second device is used for responding to the data to be processed.
In the communication method provided by the embodiment of the present invention, the first device first obtains the data to be processed and the sending time of the data to be processed, and then determines the secret key and the communication frequency band of the data to be processed according to the sending time. The first device encrypts the data to be processed by using the secret key, and sends the encrypted data to the second device through the obtained communication frequency band.
As can be seen from the above description, the key and the communication band of the data to be processed are continuously changed with the transmission time of the data to be processed, that is, the key and the communication band are dynamic. The dynamic secret key increases the cracking difficulty of the data to be processed, and the dynamic communication frequency band increases the frequency band attack difficulty, so that the data to be processed is more difficult to capture. Therefore, the invention can ensure the safety of data transmission from different aspects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart of a communication method according to an embodiment of the present invention;
fig. 2 is a flowchart of a key generation method according to an embodiment of the present invention;
fig. 3 is a flow chart of another communication method provided by the embodiment of the invention;
fig. 4 is a timing diagram illustrating an operating state of a first device according to an embodiment of the present invention;
fig. 5 is a flowchart of another communication method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a communication system according to an embodiment of the present invention;
fig. 7a is a schematic diagram of an internal structure of a first device according to an embodiment of the present invention;
fig. 7b is a schematic diagram of an internal structure of another first device according to an embodiment of the present invention;
fig. 7c is a schematic diagram of an internal structure of another first device according to an embodiment of the present invention;
fig. 8 is a schematic view of a communication method applied in a power engineering scenario according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a communication device according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an electronic device corresponding to the communication apparatus provided in the embodiment shown in fig. 9;
fig. 11 is a schematic structural diagram of another communication device according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an electronic device corresponding to the communication apparatus provided in the embodiment shown in fig. 11.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, and "a" and "an" generally include at least two, but do not exclude at least one, unless the context clearly dictates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The words "if," "if," as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a recognition," depending on the context. Similarly, the phrases "if determined" or "if identified (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when identified (a stated condition or event)" or "in response to an identification (a stated condition or event)", depending on the context.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
As mentioned in the background, wireless communication between devices may be accomplished using wireless transmission techniques. For example, in a home scene, a user may control an intelligent appliance in a home through a terminal device. For example, in an industrial engineering scene, the control device may control the industrial device to execute a related task, and may also obtain status data fed back by the industrial device, thereby implementing real-time monitoring of the working status of the industrial device. For another example, in a consumption scenario, the two parties of the transaction can use the terminal devices to complete consumption through communication.
The communication method provided by each embodiment of the invention can be used by the equipment in communication. It should be noted that the method provided by the embodiment of the present invention is particularly suitable for communication between the control device and the controlled device. The control device and the controlled device may constitute a communication system, wherein for clarity of description the controlled device in the system may be referred to as a first device and the control device may be referred to as a second device.
In practical applications, it is a common situation that the second device sends a control instruction to the first device, and the first device can directly execute the control instruction. In another common situation, the first device may feed back relevant data to the second device, either actively or in response to a control finger sent by the second device.
Based on the above background, some embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The features of the embodiments and examples described below may be combined with each other without conflict between the embodiments. In addition, the sequence of steps in each method embodiment described below is only an example and is not strictly limited.
Fig. 1 is a flowchart of a communication method according to an embodiment of the present invention, where the communication method according to the embodiment of the present invention may be executed by a first device in a communication system. It will be appreciated that the first device may be implemented as software, or a combination of software and hardware. As shown in fig. 1, the method comprises the steps of:
s101, acquiring data to be processed and sending time of the data to be processed.
The first device may acquire data to be processed. Alternatively, the data to be processed may be data describing an operating state of the first device. The operation state may specifically include a switch state of the first device, an electric quantity usage state, an operation temperature of each chip or functional module in the first device, and the like. And after the data to be processed is acquired, the first device can further read the time provided by the clock chip of the first device through the preset interface, and the time is also the sending time of the data to be processed.
Of course, the data to be processed is not limited to the data describing the operating state of the first device, but may also be image data captured by the first device, sensing data collected by the first device, or any data that needs to be fed back to the second device.
In practical applications, in one case, the first device may periodically and actively report the data to be processed to the second device. In another case, the first device may also respond to a control instruction sent by the second device, so as to feed back to the second device the data to be processed corresponding to the control instruction.
And S102, determining a key and a communication frequency band corresponding to the data to be processed according to the sending time.
The first device may determine, according to the sending time, a secret key corresponding to the data to be processed, and then determine, according to the secret key, a communication frequency band corresponding to the data to be processed.
Optionally, the first device may determine the key TOTP according to the sending time, a preset starting time, and a preset valid duration of the key. One specific way is as follows:
TOTP=floor((unixTime(now)-unixTime(T0))/TS)
wherein, now is the sending time of the data to be processed, and T0 is the preset starting time. The sending time may be a current calendar time of the first device, and the preset starting time may be a preset calendar time, such as 1/1970. unixTime (T) is a timestamp conversion function, unixTime (now) is a timestamp corresponding to the current calendar time, and unixTime (T0) is a timestamp corresponding to the preset calendar time. TS is the valid duration of the preset key, which may be 10 seconds, for example, and floor (t) is a rounding function.
The above formula can be understood as follows: for two pieces of data to be processed with transmission times of now1 and now2, after time stamp conversion is performed on the transmission times of now1 and now2, if the difference between the conversion results is smaller than the effective duration, (unixTime (now1) -unixTime (T0))/TS and (unixTime (now2) -unixTime (T0))/TS will have the same quotient value and different remainders. After rounding down, the data to be processed generated at the time now1 and now2 respectively have the same key, specifically, the encryption key. That is, at least one of the data to be processed, which are transmitted within the validity period, all have the same key.
After the key TOTP obtained in the above manner, the communication frequency band corresponding to the data to be processed may also be determined in the following manner: the index of the communication frequency band corresponding to the data to be processed is determined according to the secret key, and then the communication frequency band corresponding to the number to be processed is determined according to the preset corresponding relation between the index and the communication frequency band.
Alternatively, the INDEX corresponding to the communication frequency band may be determined by:
INDEX=int(TOTP)%N
wherein N is the number of communicable frequency bands supported by the first device.
Alternatively, the INDEX corresponding to the communication frequency band may be determined by:
INDEX=int(HASH(TOTP))%N
in the mode, hash collision can be avoided by carrying out hash operation on the secret key, so that frequency hopping is uniform, and to-be-processed data generated at different times can be uniformly transmitted through different communication frequency bands.
Both of the above ways may indicate: for two pieces of data to be processed with transmission times of now1 and now2, since the keys of the two pieces of data are the same, the two pieces of data to be processed also have the same index, and further have the same communication frequency band. That is, at least one of the data to be processed, which are transmitted within the validity period, all have the same communication band.
And S103, sending the data to be processed encrypted according to the secret key to the second equipment according to the communication frequency band.
Finally, the first device may encrypt the data to be processed according to the key determined in step 102, and then send the encrypted data to be processed to the second device using the communication frequency band determined in step 102.
Alternatively, the data transmission between the first device and the second device may be implemented by spread spectrum wireless transmission technology. Specifically, the two devices may implement data transmission by way of remote radio transmission (Long ranging, Long ra for short).
In this embodiment, the first device first obtains data to be processed and transmission time of the data to be processed, and then determines a secret key and a communication frequency band of the data to be processed according to the transmission time. The first device encrypts the data to be processed by using the secret key, and sends the encrypted data to the second device through the obtained communication frequency band. As can be seen from the above description, the key and the communication band of the data to be processed are continuously changed with the transmission time of the data to be processed, that is, the key and the communication band are dynamic. The dynamic secret key increases the cracking difficulty of the data to be processed, and the dynamic communication frequency band increases the frequency band attack difficulty, so that the data to be processed is more difficult to capture. Therefore, the present embodiment can secure data transmission from various aspects.
It should be noted that, whether the sending time is accurate may directly affect the determination of the key and the communication frequency band of the data to be processed, and therefore, in order to ensure the accuracy of the sending time, optionally, after step 101, the first device may further obtain an external reference time through an interface configured by the first device, and compare the reference time with the sending time. If the time difference between the sending time and the reference time is greater than the preset time length, the sending time is calibrated, that is, the reference time is determined as the calibrated sending time. Alternatively, the preset time duration may be a unit time duration of the effective time duration in the embodiment shown in fig. 1, for example, 1 second. Then, steps 102-103 in the above embodiment are executed based on the calibrated transmission time.
The above description is that the time calibration is performed after the data to be processed is acquired. However, since the clock chip of the first device is highly accurate, it usually has a small time drift after a long period of operation, so that time calibration every time data to be processed is generated is not a good choice, and may cause a waste of processing resources of the first device.
To avoid wasted processing resources, the first device may optionally be calibrated periodically. Specifically, at preset intervals, the first device may obtain the current time of the first device and a reference time, and calibrate the current time with the reference time, regardless of whether the data to be processed currently exists.
In the embodiment shown in fig. 1, a key determination method has been provided, but in order to further improve the difficulty of cracking the key, as shown in fig. 2, the key may also be determined in the following manner:
s201, determining a first encryption parameter according to the sending time, the preset starting time and the preset effective duration of the secret key.
The first device may determine the first encryption parameter according to the sending time, a preset starting time, and a valid duration of the key. Optionally, the first encryption parameter TC is determined in the following manner:
TC=floor((unixTime(now)-unixTime(T0))/TS)
the meaning of this formula, as well as the meaning of the other parameters in the formula, can be referred to in the description relating to the embodiment shown in fig. 1.
S202, a key is determined according to the first encryption parameter and a second encryption parameter stored in the first device.
Then, a second encryption parameter is further obtained, which optionally may comprise a parameter stored in the memory of the first device, which may be considered as a unique identification of the memory of the first device. At this time, the first encryption parameter and the second encryption parameter may be calculated according to the following formula to obtain the key TOTP:
TOTP=HASH(SecretKey,TC)
wherein, the secretekey is a second encryption parameter.
In this way, the second encryption parameter secretekey is used as a password to perform hash encryption calculation on the first encryption parameter TC, so as to obtain the key TOTP, which is dynamic.
Optionally, the second encryption parameter may further include a device identifier of the first device, and at this time, the first encryption parameter and the second encryption parameter may be further calculated in the following manner to obtain the key TOTP:
TOTP=aes128_encrypt(SecretKey,TC|DEVEUI)
the DEVEU is an equipment identifier, the secretekey and the DEVEUI are second encryption parameters, the TC | DEVEUI represents splicing operation of the TC and the DEVEUI, and the aes128_ encrypt is an encryption mode.
In this way, namely, for the splicing of TC and DEVEUI, AES encryption calculation is performed on the splicing result by using secretekey in the second encryption parameter, so as to obtain a key, and the key is dynamic.
After the key is obtained according to the different manners described above, the communication frequency band of the data to be processed can also be further determined in the manner shown in fig. 1.
In this embodiment, the generation of the key uses the sending time and the identification information of the first device at the same time, and compared with the method of generating the key only using the sending time in the embodiment shown in fig. 1, the cracking difficulty of the key can be increased, and the security of data transmission can be ensured.
It should be noted that, after receiving the encrypted to-be-processed data sent by the first device, the second device may calculate the decryption key according to the receiving time of the to-be-processed data. And when the decryption key is the same as the encryption key of the to-be-processed equipment, the second equipment successfully decrypts to obtain the to-be-processed data. Wherein the decryption key is calculated in a similar manner as the encryption key, which can be referred to the related description in fig. 1 or fig. 2. That is, the decryption key has the same validity time as the encryption key, and the data to be processed can be successfully decrypted by the second device only if it is transmitted from the first device to the second device within the validity time.
Therefore, the effective time period may be set to be slightly longer, such as 10 seconds described above. If the valid time of the key is set to be too short, it is easy to happen that when the valid time of the key is exceeded when the data to be processed is sent to the second device, the decryption key calculated by the second device according to the receiving time will be different from the encryption key, thereby causing the failure of obtaining the data to be processed by the second device. In this case, the first device also needs to retransmit the data to be processed.
It should be noted that, when the second device sends the data to be processed to the first device, the data to be processed may be encrypted in the manner in the embodiment shown in fig. 1 to fig. 2. At this time, the data to be processed transmitted by the second device may be regarded as a control instruction generated by the second device.
In practical applications, the first device is usually a controlled device, and most of the situations are passive execution of the data to be processed, i.e. the control instruction, sent by the second device, so that if the first device is always in an operating state, the power consumption of the device is greatly increased. Fig. 3 is a flowchart of another communication method according to an embodiment of the present invention. As shown in fig. 3, the method comprises the steps of:
s301, generating a detection signal corresponding to the first device at intervals of a first preset time length.
And S302, responding to the detection signal, and receiving the awakening data string sent by the second device within a second preset time length.
S303, if the length of the received wake-up data string is greater than a preset length, the first device is woken up.
Optionally, the second device may be in the wake-up state all the time, and may respond to the operation of the user and generate the control instruction at any time. Optionally, the second device may also be in a sleep state, and automatically wakes up every preset time interval to generate and send a control instruction to the first device.
Alternatively, the first device may be in a sleep state and generate one probe signal every interval for a first preset duration. The first device responds to the detection signal and judges whether a control instruction sent by the second device exists currently. If the control instruction exists, the first equipment is awakened, and if not, the first equipment continues to sleep.
Specifically, the second device may generate and send control instructions to the first device. The control instruction may be used, for example, to control the first device to feed back its own operating state to the second device. Meanwhile, the second device can also continuously generate and send the awakening data string to the first device within a third preset time length.
In the process that the second device continuously sends the wake-up data string, the first device happens to reach the first preset time length, so that the detection signal is generated and responded. At this time, the first device is in the temporary wake-up state within a second preset time period, and receives the wake-up data string sent by the second device within the second preset time period. The first preset time length is longer than the second preset time length. And the third preset duration is greater than the sum of the first preset duration and the second preset duration.
In addition, the second preset duration may be generally smaller than the first preset duration, so that the first device may be in the temporary wake-up state for a shorter duration (i.e., the second preset duration) and in the sleep state for a longer duration (i.e., the first preset duration), thereby greatly reducing the power consumption of the first device.
If the length of the wake-up data string received by the first device is greater than or equal to the preset length within the second preset duration, the first device is woken up and responds to the control instruction which is sent by the second device and waits to be executed. If the first device can continuously receive the wake-up data string within the second preset duration, determining the length of the continuously received wake-up data string as the preset length. At this point, the first device may continue to perform steps 304-306 described below.
If the length of the wake-up data string received by the first device is smaller than the preset length within the second preset duration, it indicates that the first device does not have a control instruction waiting for execution, and the first device continues to be in a dormant state.
The foregoing can be understood in conjunction with fig. 4.
It should be noted that, as can be seen from fig. 4, since the third preset time is longer than the sum of the first preset time and the second preset time, that is, the third preset time may cover one sleep cycle + one detection cycle of the first device, whenever the second device generates a control instruction, the first device may be successfully awakened only by performing detection once, so as to respond to the control instruction sent by the second device in time.
S304, acquiring the data to be processed and the sending time of the data to be processed.
S305, determining a key and a communication frequency band corresponding to the data to be processed according to the sending time.
S306, according to the communication frequency band, sending the data to be processed encrypted according to the secret key to the second device.
The execution process of the above steps 304 to 306 is similar to the corresponding steps of the foregoing embodiment, and reference may be made to the relevant description in the embodiment shown in fig. 1, which is not repeated herein.
In this embodiment, due to the introduction of the detection mechanism, the first device is briefly awakened for the first preset duration when responding to the detection signal, and is awakened and responds to the control instruction after receiving the control instruction sent by the second device, and the first device is in the sleep state at most of the time, so that the power consumption of the first device can be greatly reduced.
As can be seen from the embodiment shown in fig. 1, the first device and the second device may implement data transmission by means of LoRa wireless transmission. On the basis of the low power consumption characteristic of the LoRa wireless transmission technology, due to the introduction of a detection mechanism, the power consumption of the device can be further reduced.
Fig. 5 is a flowchart of another communication method according to an embodiment of the present invention. The communication method may be performed by a first device in a communication system. As shown in fig. 5, the method includes the steps of:
s401, acquiring data to be processed and sending time of the data to be processed.
S402, according to the sending time, determining a key and a communication frequency band corresponding to the data to be processed.
And S403, sending the to-be-processed data encrypted according to the secret key to the second equipment according to the communication frequency band in a LoRa wireless transmission mode.
The first device may be a controlled device in a communication system and, correspondingly, the second device may be a control device in the communication system. The key and the communication band of the data to be processed can be determined in the manner described in the above embodiments. And then, encrypting the data to be processed according to the determined key to obtain the encrypted data. And then, sending the encrypted data to the second equipment according to the communication frequency band in a LoRa wireless transmission mode.
The detailed implementation process of each step in this embodiment can be referred to the detailed description in the embodiments shown in fig. 1 to 4. The implementation process and technical effect of the technical solution refer to the descriptions in the embodiments shown in fig. 1 to fig. 4, and are not described herein again.
In the embodiments shown in fig. 1 to 5, it has been described that the communication system may be composed of the first device and the second device. The following may also explain the communication procedure between the first device and the second device from the perspective of the entire system. As shown in fig. 6, the communication system may include: a first device 1 and a second device 2.
The first device 1 can acquire the data to be processed and the transmission time of the data to be processed. And then, determining an encryption key and a communication frequency band of the data to be processed according to the sending time. For a specific determination method of the encryption key and the communication frequency band, reference may be made to the related description in the embodiment shown in fig. 1 or fig. 2, which is not described herein again. Finally, the first device 1 encrypts the data to be processed according to the encryption key, and then sends the encrypted data to the second device 2 according to the communication frequency band, and the second device 2 can respond to the data to be processed.
Optionally, similar to the scenario in the above embodiment, the data to be processed may be used to describe the operation status, and may also be used to describe other contents. And the number of the first devices 1 may be at least one.
Optionally, data transmission between the first device 1 and the second device 2 may be implemented by means of LoRa wireless transmission.
In this embodiment, the first device 1 determines the key and the communication frequency band of the data to be processed according to the transmission time of the data to be processed. And then, encrypting the data to be processed by using the key, and sending the communication frequency band determined by the encrypted data to the second device 2. It can be seen that the key and the communication frequency band of the data to be processed are constantly changed along with the transmission time of the data to be processed, that is, the key and the communication frequency band are both dynamic. The dynamic key and the communication frequency band can ensure the safety of data transmission.
After receiving the encrypted data to be processed, the second device may optionally determine a decryption key according to a reception time of the data to be processed. The decryption key is computed in a similar manner as the encryption key. If the decryption key matches the encryption key, for example, the decryption key is the same as the encryption key, the second device may successfully decrypt the data to be processed.
The internal structure of the first device 1 may be as shown in fig. 7a, and specifically may include: microcontroller 11, clock chip 12 and transmitting assembly 13.
The microcontroller 11 may determine the encryption key according to a preset valid duration of the encryption key, a preset start time, and a sending time output by the clock chip 12, and then determine a communication frequency band corresponding to the data to be processed according to the encryption key. The model of the clock chip may be DS 3231.
And the sending component 13 is configured to send the to-be-processed data encrypted according to the encryption key to the second device according to the determined communication frequency band. Alternatively, the sending component 13 may be specifically a chip with a model sx1276, sx1278, or sx1262, etc.
Based on the structure shown in fig. 7a, the specific process for determining the encryption key and the communication frequency band may refer to the related description in the embodiment shown in fig. 1, and is not described herein again.
On the basis of fig. 7a, the internal structure of the first device 1 may be as shown in fig. 7b, and the first device 1 may further include a storage component 14 therein.
At this time, the microcontroller 11 is configured to determine the first encryption parameter according to a preset valid duration of the encryption key, a preset start time, and a sending time output by the clock chip. The encryption key is determined based on the first encryption parameter and a second encryption parameter embedded in the storage component 14. And determining a communication frequency band corresponding to the data to be processed according to the encryption key. The memory module 14 may be an EEPROM chip of the atase 132A model.
And the sending component 13 is configured to send the to-be-processed data encrypted according to the encryption key to the second device according to the determined communication frequency band.
Based on the structure shown in fig. 7b, the specific generation process of the encryption key and the communication frequency band may refer to the related description in the embodiment shown in fig. 2, and is not described herein again.
On the basis of fig. 7b, optionally, the internal structure of the first device 1 may be as shown in fig. 7c, and a configuration component 15 may also be included in the first device 1.
The configuration component 15 may specifically be a configuration interface of the first device, through which an external reference time may be obtained, which reference is accurate.
At this time, the microcontroller 11 is configured to compare the sending time of the data to be processed with a reference time, and calibrate the sending time according to the reference time if a time difference between the sending time and the reference time is greater than a preset time length; and determining an encryption key and a communication frequency band according to the calibrated sending time.
Optionally, the first device may further comprise an execution component 16 for actually executing the control instructions sent by the second device 2.
Alternatively, the first device shown in fig. 7a can also comprise a configuration component 16, which configuration component 16 can be connected to the microcontroller 11. And the second device 2 may have the same structure as the first device 1.
Optionally, the second device 2 may continuously generate the wake-up data string within a third preset time period, and send the wake-up data string to the first device 1.
The first device 1 generates a detection signal corresponding to the first device 1 every a first preset time interval. The first device 1, in response to the detection signal, may receive the wakeup data string sent by the second device 2 within a second preset duration, where the first preset duration is longer than the second preset duration, and the third preset duration is longer than a sum of the first preset duration and the second preset duration.
If the length of the wake-up data string received by the first device is greater than or equal to the preset length, and the first device 1 determines that the control instruction which is sent by the second device and waits to be executed exists, the first device 1 is woken up to respond to the control instruction, that is, an encryption key and a communication frequency band of the data to be processed are determined, and the encrypted data to be processed are sent to the second device 2.
For a specific process of this part, reference may be made to the related description in the embodiments shown in fig. 3 to fig. 4, and details are not described here.
For convenience of understanding, a specific implementation process of the communication method provided above is exemplarily illustrated in connection with an application scenario of power engineering. The following can be understood in conjunction with fig. 8 and fig. 4 described above.
In the field of power engineering, a first device may be a power generation device installed at a remote location, such as a utility boiler, a generator, etc., and a second device may be a control device for controlling the power generation device. Since the network environment in which the first device is located is usually not good, data transmission between the power generation device and the control device can be realized by means of LoRa wireless transmission.
In practical applications, a user may trigger a control operation on the control device, which may send control instructions to the power generation device in response to the operation. The control instruction can be used for controlling the power generation equipment to feed back the current operation state of the power generation equipment to the control equipment, such as the current electric quantity use state of the power generation equipment, the operation temperature of each chip or functional module inside the power generation equipment, the accumulated power generation quantity of the power generation equipment and the like. Meanwhile, the control equipment can also continuously send the awakening data string to the power generation equipment within a third preset time length.
In the process that the control equipment sends the awakening data string, the power generation equipment happens to reach the first preset time length, at the moment, the power generation equipment can respond to the detection signal generated by the power generation equipment, so that the power generation equipment is in the temporary awakening state, and the duration time of the temporary awakening state is the second preset time length. The first preset time length is longer than the second preset time length, and the third preset time length is longer than the sum of the first preset time length and the second preset time length. The relationship between the three preset durations may also be understood with reference to fig. 4.
In this temporary wake-up state, the power generation device may receive the wake-up data string sent by the control device within a second preset time period. If the power generation equipment does not continuously receive the awakening data string within the second preset time length, that is, the length of the awakening data string is smaller than the preset length, which indicates that there is no control instruction waiting for execution currently, the power generation equipment continues to be in the dormant state after the second preset time length.
If the power generation equipment continuously receives the awakening data string within the second preset time length, that is, the length of the awakening data string is greater than or equal to the preset length, it indicates that the control instruction which is waiting for execution and sent by the control equipment exists at present, the power generation equipment is really awakened, and the control instruction is executed.
The specific execution process of the control instruction may be: the power generation equipment obtains data to be processed describing the working state of the power generation equipment and sending time of the data to be processed, wherein the sending time can be obtained through a clock chip in the power generation equipment. And then determining an encryption key and a communication frequency band of the data to be processed according to the sending time. And finally, feeding back the encrypted data to be processed to the control equipment according to the communication frequency band. The specific process for determining the encryption key and the communication frequency band may refer to the related description in the embodiment shown in fig. 1 or fig. 2.
In an optional mode, the power generation device may calibrate its clock chip periodically according to the reference time, so as to ensure accuracy of the obtained sending time of the data to be processed. In another alternative mode, the sending time can be calibrated by using the reference time immediately after the sending time is obtained, so that the accuracy of the sending time is ensured.
After the control equipment receives the data to be processed sent by the power generation equipment, a decryption key of the data to be processed can be further determined according to the receiving time of the data, and the determination mode of the decryption key is similar to that of the encryption key. When the decryption key and the encryption key are in the same effective time, namely the decryption key and the encryption key are the same, the control equipment can successfully decrypt and obtain the working state of the power generation equipment, and the motion state of the power generation equipment is displayed to a user.
In the processing process, on one hand, due to the introduction of the detection mechanism, the power generation equipment only works within the execution control instruction and the second preset time, and the rest time is in a dormant state, so that the power consumption of the first equipment is greatly reduced. On the other hand, the power generation equipment determines an encryption key and a communication frequency band according to the sending time of the data to be processed, the dynamic encryption key and the dynamic communication frequency band increase the data attack difficulty, and the data transmission safety is ensured.
It should be noted that, when the control device sends the data to be processed to the power generation device, the encryption may be performed in the same manner as in the embodiment shown in fig. 1 or fig. 2.
The communication device of one or more embodiments of the present invention will be described in detail below. Those skilled in the art will appreciate that these communication devices may each be configured using commercially available hardware components through the steps taught by the present solution.
Fig. 9 is a schematic structural diagram of a communication device according to an embodiment of the present invention, and as shown in fig. 9, the communication device includes:
the obtaining module 21 is configured to obtain data to be processed and sending time of the data to be processed.
And a determining module 22, configured to determine, according to the sending time, a key and a communication frequency band corresponding to the to-be-processed data.
And the sending module 23 is configured to send the to-be-processed data encrypted according to the secret key to the second device according to the communication frequency band.
Optionally, the determining module 22 specifically includes:
and a key determining unit 221, configured to determine, according to the sending time, a key corresponding to the to-be-processed data.
A frequency band determining unit 222, configured to determine, according to the key, a communication frequency band corresponding to the data to be processed.
Optionally, the key determining unit 221 is specifically configured to: determining a first encryption parameter according to the sending time, a preset starting time and a preset effective duration of the secret key; and determining the key according to the first encryption parameter and a second encryption parameter stored in the first device.
Optionally, the frequency band determining unit 222 is specifically configured to: converting the data type of the key; and determining the communication frequency band corresponding to the data to be processed according to the number of the communication frequency bands supported by the first device and the key after data type conversion.
Optionally, the apparatus further comprises: a calibration module 24 for obtaining a reference time; and if the time difference between the sending time and the reference time is greater than a preset time, calibrating the sending time according to the reference time so as to determine a secret key and a communication frequency band according to the calibrated sending time.
Optionally, the apparatus further comprises: a generating module 25, a receiving module 26 and a wake-up module 27.
The generating module 25 is configured to generate a detection signal corresponding to the first device every first preset time interval.
The receiving module 26 is configured to receive, in response to the detection signal, the wake-up data string sent by the second device within a second preset time period, where the second device continuously sends the wake-up data string within a preset third time period, the first preset time period is greater than the second preset time period, and the third preset time period is greater than a sum of the first preset time period and the second preset time period.
The wake-up module 27 is configured to wake up the first device if the length of the received wake-up data string is greater than or equal to a preset length, to determine a key and a communication frequency band corresponding to the to-be-processed data, and send the encrypted to-be-processed data to the second device.
The first equipment is controlled equipment, the second equipment is control equipment, and the first equipment sends the encrypted data to be processed to the second equipment in a LoRa wireless transmission mode.
The apparatus shown in fig. 9 can perform the method of the embodiment shown in fig. 1 to 4, and reference may be made to the related description of the embodiment shown in fig. 1 to 4 for a part not described in detail in this embodiment. The implementation process and technical effect of the technical solution refer to the descriptions in the embodiments shown in fig. 1 to fig. 4, and are not described herein again.
Having described the internal functions and structure of the communication device, in one possible design, the structure of the communication device may be implemented as an electronic device, as shown in fig. 10, which may include: a processor 31 and a memory 32. Wherein the memory 32 is used for storing a program for supporting the electronic device to execute the communication method provided in the embodiments shown in fig. 1 to 4, and the processor 31 is configured to execute the program stored in the memory 32.
The program comprises one or more computer instructions which, when executed by the processor 31, are capable of performing the steps of:
acquiring data to be processed and sending time of the data to be processed;
determining a key and a communication frequency band corresponding to the data to be processed according to the sending time;
and sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band.
Optionally, the processor 31 is further configured to perform all or part of the steps in the foregoing embodiments shown in fig. 1 to 4.
The electronic device may further include a communication interface 33 for communicating with other devices or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for the electronic device, which includes a program for executing the communication method in the method embodiments shown in fig. 1 to 4.
Fig. 11 is a schematic structural diagram of another communication device according to an embodiment of the present invention, and as shown in fig. 11, the device includes:
an obtaining module 41, configured to obtain data to be processed and sending time of the data to be processed.
And a determining module 42, configured to determine, according to the sending time, a key and a communication frequency band corresponding to the to-be-processed data.
And the sending module 43 is configured to send the to-be-processed data encrypted according to the secret key to the second device according to the communication frequency band in an LoRa wireless transmission manner.
The apparatus shown in fig. 11 can execute the method of the embodiment shown in fig. 5, and reference may be made to the related description of the embodiment shown in fig. 5 for a part of this embodiment that is not described in detail. The implementation process and technical effect of the technical solution are described in the embodiment shown in fig. 5, and are not described herein again.
Having described the internal functions and structure of the communication device, in one possible design, the structure of the communication device may be implemented as an electronic device, as shown in fig. 12, which may include: a processor 51 and a memory 52. Wherein the memory 32 is used for storing a program for supporting the electronic device to execute the communication method provided in the embodiment shown in fig. 5, and the processor 51 is configured to execute the program stored in the memory 32.
The program comprises one or more computer instructions which, when executed by the processor 31, are capable of performing the steps of:
acquiring data to be processed and sending time of the data to be processed;
determining a key and a communication frequency band corresponding to the data to be processed according to the sending time;
and sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band in a LoRa wireless transmission mode.
Optionally, the processor 51 is further configured to perform all or part of the steps in the foregoing embodiment shown in fig. 5.
The electronic device may further include a communication interface 53 for communicating with other devices or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for the electronic device, which includes a program for executing the communication method in the method embodiment shown in fig. 5.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (22)
1. A communication method applied to a first device comprises the following steps:
acquiring data to be processed and sending time of the data to be processed;
determining a key and a communication frequency band corresponding to the data to be processed according to the sending time;
and sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band.
2. The method of claim 1, wherein the determining the key and the communication band corresponding to the data to be processed according to the sending time comprises:
determining a key corresponding to the data to be processed according to the sending time;
and determining a communication frequency band corresponding to the data to be processed according to the secret key.
3. The method according to claim 2, wherein the determining the key corresponding to the data to be processed according to the sending time includes:
determining a first encryption parameter according to the sending time, a preset starting time and a preset effective duration of the secret key;
and determining the key according to the first encryption parameter and a second encryption parameter stored in the first device.
4. The method according to claim 3, wherein the determining, according to the key, a communication frequency band corresponding to the data to be processed includes:
converting the data type of the key;
and determining the communication frequency band corresponding to the data to be processed according to the number of the communication frequency bands supported by the first device and the key after data type conversion.
5. The method of claim 1, further comprising:
acquiring a reference time;
and if the time difference between the sending time and the reference time is greater than a preset time, calibrating the sending time according to the reference time so as to determine a secret key and a communication frequency band according to the calibrated sending time.
6. The method of claim 1, further comprising:
generating a detection signal corresponding to the first device every a first preset time interval;
responding to the detection signal, receiving a wake-up data string sent by the second equipment within a second preset time length, wherein the second equipment continuously sends the wake-up data string within a preset third time length, the first preset time length is longer than the second preset time length, and the third preset time length is longer than the sum of the first preset time length and the second preset time length;
and if the length of the received awakening data string is greater than or equal to the preset length, awakening the first equipment to determine a key and a communication frequency band corresponding to the data to be processed, and sending the encrypted data to be processed to the second equipment.
7. The method according to any one of claims 1 to 6, wherein the first device is a controlled device, the second device is a control device, and the first device transmits the encrypted data to be processed to the second device in a LoRa wireless transmission manner.
8. A communication method applied to a first device comprises the following steps:
acquiring data to be processed and sending time of the data to be processed;
determining a key and a communication frequency band corresponding to the data to be processed according to the sending time;
and sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band in a LoRa wireless transmission mode.
9. A communication system, comprising: a first device and a second device;
the first device is used for acquiring data to be processed and the sending time of the data to be processed; determining an encryption key and a communication frequency band corresponding to the data to be processed according to the sending time; according to the communication frequency band, sending the data to be processed encrypted according to the encryption key to the second device;
the second device is used for responding to the data to be processed.
10. The system of claim 9, wherein the first device comprises: the system comprises a microcontroller, a clock chip and a sending component;
the microcontroller is used for determining an encryption key according to the preset effective duration of the encryption key, the preset starting time and the sending time output by the clock chip; determining a communication frequency band corresponding to the data to be processed according to the encryption key;
and the sending component is configured to send the to-be-processed data encrypted according to the encryption key to the second device according to the communication frequency band.
11. The system of claim 9, wherein the first device comprises: the device comprises a microcontroller, a clock chip, a storage component and a sending component;
the microcontroller is used for determining a first encryption parameter according to a preset effective duration of the encryption key, a preset starting time and the sending time output by the clock chip;
determining the encryption key according to the first encryption parameter and a second encryption parameter built in the storage component; determining a communication frequency band corresponding to the data to be processed according to the encryption key;
and the sending component is configured to send the to-be-processed data encrypted according to the encryption key to the second device according to the communication frequency band.
12. The system of claim 10 or 11, wherein the first device further comprises: a configuration component for obtaining a reference time;
the microcontroller is further configured to calibrate the sending time according to the reference time if a time difference between the sending time and the reference time is greater than a preset time length; and determining an encryption key and a communication frequency band according to the calibrated sending time.
13. The system of claim 9, wherein the first device is further configured to generate a probe signal corresponding to the first device every first predetermined duration; and
responding to the detection signal, and receiving a wake-up data string sent by the second equipment within a second preset time length, wherein the first preset time length is greater than the second preset time length;
and if the length of the received awakening data string is greater than or equal to the preset length, awakening the first equipment to determine an encryption key and a communication frequency band corresponding to the data to be processed, and sending the encrypted data to be processed to the second equipment.
14. The system of claim 13, wherein the second device is configured to generate and send the wake-up string to the first device for a third predetermined duration, and wherein the third predetermined duration is greater than a sum of the first predetermined duration and the second predetermined duration.
15. The system of claim 9, wherein the second device is further configured to:
determining a decryption key according to the receiving time of the data to be processed;
and responding to the data to be processed if the decryption key is matched with the encryption key.
16. The system according to claim 9, wherein the first device is a controlled device, the second device is a control device, and the first device sends the encrypted data to be processed to the second device in a LoRa wireless transmission manner.
17. A communications apparatus, comprising:
the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring data to be processed and the sending time of the data to be processed;
a determining module, configured to determine, according to the sending time, a key and a communication frequency band corresponding to the to-be-processed data;
and the sending module is used for sending the data to be processed encrypted according to the secret key to the second equipment according to the communication frequency band.
18. An electronic device, comprising: a memory, a processor; wherein the memory has stored thereon executable code which, when executed by the processor, causes the processor to perform the communication method of any one of claims 1 to 7.
19. A non-transitory machine-readable storage medium having stored thereon executable code, which when executed by a processor of an electronic device, causes the processor to perform the communication method of any one of claims 1 to 7.
20. A communications apparatus, comprising:
the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring data to be processed and the sending time of the data to be processed;
a determining module, configured to determine, according to the sending time, a key and a communication frequency band corresponding to the to-be-processed data;
and the sending module is used for sending the data to be processed encrypted according to the secret key to second equipment according to the communication frequency band in a LoRa wireless transmission mode.
21. An electronic device, comprising: a memory, a processor; wherein the memory has stored thereon executable code which, when executed by the processor, causes the processor to perform the communication method of claim 8.
22. A non-transitory machine-readable storage medium having stored thereon executable code, which when executed by a processor of an electronic device, causes the processor to perform the communication method of claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010745624.1A CN114095920A (en) | 2020-07-29 | 2020-07-29 | Communication method, system, apparatus, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010745624.1A CN114095920A (en) | 2020-07-29 | 2020-07-29 | Communication method, system, apparatus, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114095920A true CN114095920A (en) | 2022-02-25 |
Family
ID=80294911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010745624.1A Pending CN114095920A (en) | 2020-07-29 | 2020-07-29 | Communication method, system, apparatus, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114095920A (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030053492A1 (en) * | 2000-09-01 | 2003-03-20 | Osamu Matsunaga | Multiplexer, receiver, and multiplex transmission method |
US20060217063A1 (en) * | 2005-03-24 | 2006-09-28 | Honeywell International Inc | A system for secure communications |
CN201336705Y (en) * | 2009-01-23 | 2009-10-28 | 苏州大学 | Device for ensuring safety of video monitor information |
CN101820621A (en) * | 2010-01-14 | 2010-09-01 | 北京科技大学 | Key updating method based on local information collaboration |
US20100332822A1 (en) * | 2009-06-24 | 2010-12-30 | Yong Liu | Wireless multiband security |
CN105430661A (en) * | 2015-11-11 | 2016-03-23 | 中国联合网络通信集团有限公司 | Frequency band allocation method and device |
CN106658320A (en) * | 2015-08-18 | 2017-05-10 | Gn瑞声达A/S | Method for exchanging data packets between a first portable communication device and a second portable communication device using a favorite frequency band |
CN107819572A (en) * | 2017-09-29 | 2018-03-20 | 北京比特大陆科技有限公司 | Order transmission method, device and electronic equipment |
CN108462686A (en) * | 2018-01-08 | 2018-08-28 | 平安科技(深圳)有限公司 | Acquisition methods, device, terminal device and the storage medium of dynamic key |
CN108770068A (en) * | 2018-06-04 | 2018-11-06 | Oppo广东移动通信有限公司 | A kind of WIFI Frequency Band Selections method, apparatus, storage medium and electronic equipment |
CN108965302A (en) * | 2018-07-24 | 2018-12-07 | 苏州科达科技股份有限公司 | Media data transmission system, method, apparatus and storage medium |
CN110719620A (en) * | 2019-10-18 | 2020-01-21 | 中国联合网络通信集团有限公司 | Terminal access method and system |
CN110771218A (en) * | 2017-06-13 | 2020-02-07 | 高通股份有限公司 | Signaling for detected synchronization signal blocks |
CN110875901A (en) * | 2018-08-31 | 2020-03-10 | 无锡小天鹅电器有限公司 | Information processing method and device and clothes processing device |
CN111064572A (en) * | 2019-12-24 | 2020-04-24 | 珠海荣邦智能科技有限公司 | Data communication method and device |
-
2020
- 2020-07-29 CN CN202010745624.1A patent/CN114095920A/en active Pending
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030053492A1 (en) * | 2000-09-01 | 2003-03-20 | Osamu Matsunaga | Multiplexer, receiver, and multiplex transmission method |
US20060217063A1 (en) * | 2005-03-24 | 2006-09-28 | Honeywell International Inc | A system for secure communications |
CN201336705Y (en) * | 2009-01-23 | 2009-10-28 | 苏州大学 | Device for ensuring safety of video monitor information |
US20100332822A1 (en) * | 2009-06-24 | 2010-12-30 | Yong Liu | Wireless multiband security |
CN101820621A (en) * | 2010-01-14 | 2010-09-01 | 北京科技大学 | Key updating method based on local information collaboration |
CN106658320A (en) * | 2015-08-18 | 2017-05-10 | Gn瑞声达A/S | Method for exchanging data packets between a first portable communication device and a second portable communication device using a favorite frequency band |
CN105430661A (en) * | 2015-11-11 | 2016-03-23 | 中国联合网络通信集团有限公司 | Frequency band allocation method and device |
CN110771218A (en) * | 2017-06-13 | 2020-02-07 | 高通股份有限公司 | Signaling for detected synchronization signal blocks |
CN107819572A (en) * | 2017-09-29 | 2018-03-20 | 北京比特大陆科技有限公司 | Order transmission method, device and electronic equipment |
CN108462686A (en) * | 2018-01-08 | 2018-08-28 | 平安科技(深圳)有限公司 | Acquisition methods, device, terminal device and the storage medium of dynamic key |
CN108770068A (en) * | 2018-06-04 | 2018-11-06 | Oppo广东移动通信有限公司 | A kind of WIFI Frequency Band Selections method, apparatus, storage medium and electronic equipment |
CN108965302A (en) * | 2018-07-24 | 2018-12-07 | 苏州科达科技股份有限公司 | Media data transmission system, method, apparatus and storage medium |
CN110875901A (en) * | 2018-08-31 | 2020-03-10 | 无锡小天鹅电器有限公司 | Information processing method and device and clothes processing device |
CN110719620A (en) * | 2019-10-18 | 2020-01-21 | 中国联合网络通信集团有限公司 | Terminal access method and system |
CN111064572A (en) * | 2019-12-24 | 2020-04-24 | 珠海荣邦智能科技有限公司 | Data communication method and device |
Non-Patent Citations (1)
Title |
---|
卫朋: "【IoT】加密与安全:双因素认证(2FA):TOTP", Retrieved from the Internet <URL:https://blog.csdn.net/liwei16611/article/details/90549916> * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11288400B2 (en) | Method, transmitter, and receiver for authenticating and protecting the integrity of message contents | |
CN109417758B (en) | Bluetooth connection method and terminal | |
US9787716B2 (en) | Power saving control apparatus and method | |
Liao et al. | Di-PriDA: Differentially private distributed load balancing control for the smart grid | |
CN103533606A (en) | Information transmission method of wireless local-area network, terminal and access device | |
US11196723B2 (en) | Encrypted control system, encrypted control method, and encrypted control program | |
CN107968736B (en) | Intelligent home system, information encryption method and device and terminal | |
KR101294279B1 (en) | Sensor Node Comprising Wake-up Module, Apparatus and Method Controlling Wake-up Sequence | |
CN111757274B (en) | Data transmission method and system between sensor and electronic device | |
CN210515295U (en) | Security authentication system and information processing device based on security chip | |
CN114095920A (en) | Communication method, system, apparatus, device and storage medium | |
Kavoukis et al. | Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks | |
CN112261648A (en) | Intelligent household system, intelligent household wireless communication encryption method and system | |
CN109218968B (en) | Staff positioning method and system | |
KR101996002B1 (en) | Beacon for processing user's fingerprint information and method for information providing service | |
JP2017211850A (en) | Data transmission/reception method and sensing system | |
Vysotskiy et al. | Secure Communication Technology for Devices with Limited Resources | |
Stecklina et al. | A secure wake-up scheme for low power wireless sensor nodes | |
JP2005245833A (en) | Method for collecting sensor information, mobile terminal, infrastructure sensor device, center station, user terminal, and method for operating them | |
EP4086833A1 (en) | Method and device for processing payment information, wearable apparatus, and computer readable storage medium | |
WO2018076299A1 (en) | Data transmission method and device | |
CN109151965B (en) | Staff positioning method and system | |
CN114241632A (en) | Vehicle unlocking method, wearable device and intelligent unlocking system | |
Nguyen et al. | Low-power and cost-effective wifi sensor motes for wireless embedded internet applications | |
JP5459297B2 (en) | Wireless receiver, wireless communication system, program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |